subject
Computers and Technology, 24.03.2021 17:20 pssluke

The application team within a company is asking the security team to investigate why its application is slow after an upgrade. The source of the team's application is 10.13.136.9, and the destination IP is 10.17.36.5. The security analyst pulls the logs from the endpoint security software but sees nothing is being blocked. The analyst then looks at the UTM firewall logs and sees the following: Session Source Destination Protocol Port Action IPS DoS
12699 10.13. 136.9 10.17.36. 5 TCP 80 Allow Yes No
12699 10.13. 136.9 10.17. 36.5 TCP 443 Allow Yes No
12699 10.13. 136.9 10.17.36. 5 TCP 1433 Deny Yes No
12719 10.13.136. s 10.17.36. 5 TCP 87 Deny Yes No
12719 10.13. 136.9 10.17.36.5 TCP 88 Allow Yes No
12719 10.13. 136.9 10.17.36.5 TCP 636 Allow Yes No
12899 10.13. 126.6 10.17.36.5 UDP 9877 Deny No No

Which of the following should the security analyst request NEXT based on the UTM firewall analysis?
a. Request the application team to allow TCP port 87 to listen on 10.17.36.5.
b. Request the network team to open port 1433 from 10.13.136.9 to 10.17.36.5.
c. Request the network team to turn of IPS for 10.13.136.8 going to 10.17.36.5.
d. Request the application team to reconfigure the application and allow RPC communication.

ansver
Answers: 2

Another question on Computers and Technology

question
Computers and Technology, 23.06.2019 07:30
To check spelling errors in a document, the word application uses the to determine appropriate spelling. internet built-in dictionary user-defined words other text in the document
Answers: 2
question
Computers and Technology, 23.06.2019 11:00
What is the name of the sound effect that danny hears
Answers: 1
question
Computers and Technology, 23.06.2019 12:40
According to the video what are some tasks petroleum engineers perform check all that apply
Answers: 2
question
Computers and Technology, 23.06.2019 13:30
Me ! evelyn is a manager in a retail unit. she wants to prepare a report on the projected profit for the next year. which function can she use? a. pmt b. round c. division d. what-if analysis
Answers: 2
You know the right answer?
The application team within a company is asking the security team to investigate why its application...
Questions
question
Mathematics, 28.09.2019 15:30
question
Mathematics, 28.09.2019 15:50
Questions on the website: 13722367